Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231130-en -
resource tags
arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system -
submitted
11/12/2023, 11:23
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://178g46tt.r.us-west-2.awstrack.me/I0/0101018c44d1145b-dbee17c2-2b1f-49ff-a6a4-ef16c975f4e8-000000/DqAdaKEg3OpKiGoZyhZTC5YeSQc=352
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
https://178g46tt.r.us-west-2.awstrack.me/I0/0101018c44d1145b-dbee17c2-2b1f-49ff-a6a4-ef16c975f4e8-000000/DqAdaKEg3OpKiGoZyhZTC5YeSQc=352
Resource
win10v2004-20231130-en
General
-
Target
https://178g46tt.r.us-west-2.awstrack.me/I0/0101018c44d1145b-dbee17c2-2b1f-49ff-a6a4-ef16c975f4e8-000000/DqAdaKEg3OpKiGoZyhZTC5YeSQc=352
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133467674374782805" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3292 chrome.exe 3292 chrome.exe 2300 chrome.exe 2300 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3292 chrome.exe 3292 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe Token: SeShutdownPrivilege 3292 chrome.exe Token: SeCreatePagefilePrivilege 3292 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe 3292 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3292 wrote to memory of 3544 3292 chrome.exe 13 PID 3292 wrote to memory of 3544 3292 chrome.exe 13 PID 3292 wrote to memory of 2200 3292 chrome.exe 26 PID 3292 wrote to memory of 2200 3292 chrome.exe 26 PID 3292 wrote to memory of 2200 3292 chrome.exe 26 PID 3292 wrote to memory of 2200 3292 chrome.exe 26 PID 3292 wrote to memory of 2200 3292 chrome.exe 26 PID 3292 wrote to memory of 2200 3292 chrome.exe 26 PID 3292 wrote to memory of 2200 3292 chrome.exe 26 PID 3292 wrote to memory of 2200 3292 chrome.exe 26 PID 3292 wrote to memory of 2200 3292 chrome.exe 26 PID 3292 wrote to memory of 2200 3292 chrome.exe 26 PID 3292 wrote to memory of 2200 3292 chrome.exe 26 PID 3292 wrote to memory of 2200 3292 chrome.exe 26 PID 3292 wrote to memory of 2200 3292 chrome.exe 26 PID 3292 wrote to memory of 2200 3292 chrome.exe 26 PID 3292 wrote to memory of 2200 3292 chrome.exe 26 PID 3292 wrote to memory of 2200 3292 chrome.exe 26 PID 3292 wrote to memory of 2200 3292 chrome.exe 26 PID 3292 wrote to memory of 2200 3292 chrome.exe 26 PID 3292 wrote to memory of 2200 3292 chrome.exe 26 PID 3292 wrote to memory of 2200 3292 chrome.exe 26 PID 3292 wrote to memory of 2200 3292 chrome.exe 26 PID 3292 wrote to memory of 2200 3292 chrome.exe 26 PID 3292 wrote to memory of 2200 3292 chrome.exe 26 PID 3292 wrote to memory of 2200 3292 chrome.exe 26 PID 3292 wrote to memory of 2200 3292 chrome.exe 26 PID 3292 wrote to memory of 2200 3292 chrome.exe 26 PID 3292 wrote to memory of 2200 3292 chrome.exe 26 PID 3292 wrote to memory of 2200 3292 chrome.exe 26 PID 3292 wrote to memory of 2200 3292 chrome.exe 26 PID 3292 wrote to memory of 2200 3292 chrome.exe 26 PID 3292 wrote to memory of 2200 3292 chrome.exe 26 PID 3292 wrote to memory of 2200 3292 chrome.exe 26 PID 3292 wrote to memory of 2200 3292 chrome.exe 26 PID 3292 wrote to memory of 2200 3292 chrome.exe 26 PID 3292 wrote to memory of 2200 3292 chrome.exe 26 PID 3292 wrote to memory of 2200 3292 chrome.exe 26 PID 3292 wrote to memory of 2200 3292 chrome.exe 26 PID 3292 wrote to memory of 2200 3292 chrome.exe 26 PID 3292 wrote to memory of 1336 3292 chrome.exe 25 PID 3292 wrote to memory of 1336 3292 chrome.exe 25 PID 3292 wrote to memory of 1764 3292 chrome.exe 24 PID 3292 wrote to memory of 1764 3292 chrome.exe 24 PID 3292 wrote to memory of 1764 3292 chrome.exe 24 PID 3292 wrote to memory of 1764 3292 chrome.exe 24 PID 3292 wrote to memory of 1764 3292 chrome.exe 24 PID 3292 wrote to memory of 1764 3292 chrome.exe 24 PID 3292 wrote to memory of 1764 3292 chrome.exe 24 PID 3292 wrote to memory of 1764 3292 chrome.exe 24 PID 3292 wrote to memory of 1764 3292 chrome.exe 24 PID 3292 wrote to memory of 1764 3292 chrome.exe 24 PID 3292 wrote to memory of 1764 3292 chrome.exe 24 PID 3292 wrote to memory of 1764 3292 chrome.exe 24 PID 3292 wrote to memory of 1764 3292 chrome.exe 24 PID 3292 wrote to memory of 1764 3292 chrome.exe 24 PID 3292 wrote to memory of 1764 3292 chrome.exe 24 PID 3292 wrote to memory of 1764 3292 chrome.exe 24 PID 3292 wrote to memory of 1764 3292 chrome.exe 24 PID 3292 wrote to memory of 1764 3292 chrome.exe 24 PID 3292 wrote to memory of 1764 3292 chrome.exe 24 PID 3292 wrote to memory of 1764 3292 chrome.exe 24 PID 3292 wrote to memory of 1764 3292 chrome.exe 24 PID 3292 wrote to memory of 1764 3292 chrome.exe 24
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffc92b9758,0x7fffc92b9768,0x7fffc92b97781⤵PID:3544
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://178g46tt.r.us-west-2.awstrack.me/I0/0101018c44d1145b-dbee17c2-2b1f-49ff-a6a4-ef16c975f4e8-000000/DqAdaKEg3OpKiGoZyhZTC5YeSQc=3521⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1848,i,15270544058606861350,13117885282172953314,131072 /prefetch:82⤵PID:1764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1848,i,15270544058606861350,13117885282172953314,131072 /prefetch:82⤵PID:1336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1744 --field-trial-handle=1848,i,15270544058606861350,13117885282172953314,131072 /prefetch:22⤵PID:2200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3068 --field-trial-handle=1848,i,15270544058606861350,13117885282172953314,131072 /prefetch:12⤵PID:3796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3060 --field-trial-handle=1848,i,15270544058606861350,13117885282172953314,131072 /prefetch:12⤵PID:4612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5080 --field-trial-handle=1848,i,15270544058606861350,13117885282172953314,131072 /prefetch:82⤵PID:4244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5084 --field-trial-handle=1848,i,15270544058606861350,13117885282172953314,131072 /prefetch:82⤵PID:4788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2352 --field-trial-handle=1848,i,15270544058606861350,13117885282172953314,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2300
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5ffe58efb4eb7b0717d56340efd165778
SHA1d460c2e18c9d1bf39bd25fb124e4de87dd970513
SHA25638a9ff5c08d4f8e50226afdd57c260a429dcc0e7bef513c2130354c4ef3838aa
SHA51267503adf06bccaa5297cc6bb6a5f479f6d05d73abbd33a886ce302963133b714ed19fc1c65c08f873442aa97b092e8e07defde2ec7b317fd6f03a272ca86bc33
-
Filesize
115KB
MD5b41a8cbab4e272858107301d02eb5c63
SHA1732031a7c7f7b28198adf699ef964907e718a0e2
SHA256539243c35218201d03de3a966ecb9d1448d688935e84fad5fbf6b23f3c9c666f
SHA5122cecd8271f32c17a656b82ffb44f297d7eed466695619c7c72e2cc304cda270cadd49858c013840900ac2466cbef22d1a7b31da63bf4998c6d49981e07066f70
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd